mirror of
git://git.gnupg.org/gnupg.git
synced 2025-04-17 15:44:34 +02:00
* gpg.texi (OpenPGP Options): Clarify that personal-foo-preferences
overrides recipient preferences (safely).
This commit is contained in:
parent
1b61770848
commit
38a3e20952
@ -1,3 +1,8 @@
|
|||||||
|
2009-08-17 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
|
* gpg.texi (OpenPGP Options): Clarify that
|
||||||
|
personal-foo-preferences overrides recipient preferences (safely).
|
||||||
|
|
||||||
2009-08-14 David Shaw <dshaw@jabberwocky.com>
|
2009-08-14 David Shaw <dshaw@jabberwocky.com>
|
||||||
|
|
||||||
* gpg.texi (GPG Configuration Options): Document keyserver options
|
* gpg.texi (GPG Configuration Options): Document keyserver options
|
||||||
|
23
doc/gpg.texi
23
doc/gpg.texi
@ -1968,17 +1968,19 @@ message modification attack.
|
|||||||
Set the list of personal cipher preferences to @code{string}. Use
|
Set the list of personal cipher preferences to @code{string}. Use
|
||||||
@command{@gpgname --version} to get a list of available algorithms,
|
@command{@gpgname --version} to get a list of available algorithms,
|
||||||
and use @code{none} to set no preference at all. This allows the user
|
and use @code{none} to set no preference at all. This allows the user
|
||||||
to factor in their own preferred algorithms when algorithms are chosen
|
to safely override the algorithm chosen by the recipient key
|
||||||
via recipient key preferences. The most highly ranked cipher in this
|
preferences, as GPG will only select an algorithm that is usable by
|
||||||
list is also used for the @option{--symmetric} encryption command.
|
all recipients. The most highly ranked cipher in this list is also
|
||||||
|
used for the @option{--symmetric} encryption command.
|
||||||
|
|
||||||
@item --personal-digest-preferences @code{string}
|
@item --personal-digest-preferences @code{string}
|
||||||
Set the list of personal digest preferences to @code{string}. Use
|
Set the list of personal digest preferences to @code{string}. Use
|
||||||
@command{@gpgname --version} to get a list of available algorithms,
|
@command{@gpgname --version} to get a list of available algorithms,
|
||||||
and use @code{none} to set no preference at all. This allows the user
|
and use @code{none} to set no preference at all. This allows the user
|
||||||
to factor in their own preferred algorithms when algorithms are chosen
|
to safely override the algorithm chosen by the recipient key
|
||||||
via recipient key preferences. The most highly ranked digest
|
preferences, as GPG will only select an algorithm that is usable by
|
||||||
algorithm in this list is also used when signing without encryption
|
all recipients. The most highly ranked digest algorithm in this list
|
||||||
|
is also used when signing without encryption
|
||||||
(e.g. @option{--clearsign} or @option{--sign}). The default value is
|
(e.g. @option{--clearsign} or @option{--sign}). The default value is
|
||||||
SHA-1.
|
SHA-1.
|
||||||
|
|
||||||
@ -1986,10 +1988,11 @@ SHA-1.
|
|||||||
Set the list of personal compression preferences to @code{string}.
|
Set the list of personal compression preferences to @code{string}.
|
||||||
Use @command{@gpgname --version} to get a list of available
|
Use @command{@gpgname --version} to get a list of available
|
||||||
algorithms, and use @code{none} to set no preference at all. This
|
algorithms, and use @code{none} to set no preference at all. This
|
||||||
allows the user to factor in their own preferred algorithms when
|
allows the user to safely override the algorithm chosen by the
|
||||||
algorithms are chosen via recipient key preferences. The most highly
|
recipient key preferences, as GPG will only select an algorithm that
|
||||||
ranked compression algorithm in this list is also used when there are
|
is usable by all recipients. The most highly ranked compression
|
||||||
no recipient keys to consider (e.g. @option{--symmetric}).
|
algorithm in this list is also used when there are no recipient keys
|
||||||
|
to consider (e.g. @option{--symmetric}).
|
||||||
|
|
||||||
@item --s2k-cipher-algo @code{name}
|
@item --s2k-cipher-algo @code{name}
|
||||||
Use @code{name} as the cipher algorithm used to protect secret keys.
|
Use @code{name} as the cipher algorithm used to protect secret keys.
|
||||||
|
Loading…
x
Reference in New Issue
Block a user